Professional Documents
Culture Documents
CCS 4204 Lecture 4
CCS 4204 Lecture 4
Add
INTRODUCTION
Whatsapp privacy issue
Introduction
Data to share
Phone numbers, usage data, and information on devices and
operating systems being used
Goal
make better friend suggestions and
display more relevant ads to users
WhatsApp generate more revenue
Privacy Protection and Law
Information is stored,analyzed, reported for better decision
making
to hire a job candidate, approve a loan, or offer a scholarship
Companies use information to’
To target marketing efforts to consumers
To serve them better
Privacy Protection and Law
Data Gathered
Privacy Protection and Law
Kenyan Constitution(Chapter 4) guarantees
Privacy Protection and Law
Systems that gather data on individuals
Privacy Protection and Law
Systems that gather data on individuals
Information Privacy
Defn
Combination of Communication privacy and data privacy
Is the combination of communications privacy (the ability to
communicate with others without those communications being
monitored by other persons or organizations) and data privacy (the
ability to limit access to one’s personal data by other individuals and
organizations in order to exercise a substantial degree of control
over that data and their use).
Privacy Breaches
Financial data
Give out much information to obtain credit from banks
credit cards, checking and savings accounts, loans, payroll direct
deposit etc
inadvertent loss or disclosure of these personal financial data carries
a high risk of loss of privacy and potential financial loss.
Health Information
Health ACT 2017
Privacy Breaches
Children’s Personal Data
Data Protection Act 2019
Child online Protection
KEY PRIVACY AND ANONYMITY ISSUES
Include
consumer profiling,
electronic discovery,
workplace monitoring, and
Advanced surveillance technology.
Consumer Profiling
Companies openly collect personal information about users
when they register at websites, complete surveys, fill out
forms
use tracking software to allow their websites to analyze
browsing habits and deduce personal interests and
preferences
Use cookies to obtain personal information
tailor the ads and promotions presented to you
Customer Profiling
If data breach(unintended release of sensitive data or the
access of sensitive data) customer ends up losing
Leads to identity theft
Customer Profiling
Identity theft- theft of personal information, which is then used
without the owner’s permission. Often, stolen personal
identification information, such as a person’s name, Social
Security number, or credit card number, is used to commit
fraud or other crimes
Organizations fear announcing data breaches
Electronic Discovery
Defn:
is the collection, preparation, review, and production of electronically
stored information for use in criminal and civil actions and
proceedings.
Electronically stored information (ESI)
includes any form of digital information, including emails, drawings,
graphs, web pages, photographs, word-processing files, sound
recordings, and databases stored on any form of magnetic storage
device, including hard drives, CDs, and flash drives.
Workplace Monitoring
employers monitor workers to ensure that corporate IT usage
policies are being followed.
80 % of major companies choose to record and review
employee communications and activities on the job, including
phone calls, email, and web surfing
Issue
the extent to which employers should be able to monitor the work-
related activities of employees
Case Study
Add
Advanced Surveillance Technology
surveillance cameras and satellite-based systems that can
pinpoint a person’s physical location (huduma card)
diminish individual privacy and complicate the issue of how
much information should be captured
Can be
Camera Surveillance-cctv
Stalking Apps i.e Mobile Spy, ePhoneTracker, FlexiSPY, and Mobile Nanny
END OF LECTURE